Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used ...
GHENT, Belgium, April 20, 2026 (GLOBE NEWSWIRE) -- Aikido Security today launched Aikido Endpoint, a lightweight security agent that protects developer devices against software supply chain attacks by ...
AI companies are holding back models that could be used in cyber attacks, instead deploying them to build defence systems.
Two phishing campaigns, each using a different stealthy infection technique, are targeting organizations in attacks which aim ...
An attacker purchased 30+ WordPress plugins on Flippa, planted backdoors that lay dormant for eight months, then activated ...
The supply chain attack on third-party library Axios has forced OpenAI to revoke its code-signing certificate and require ...
CISA has added eight more vulnerabilities to the KEV catalog, including Cisco, Kentico, and Zimbra flaws not previously ...
ESET researchers discovered a new NGate malware variant abusing the legitimate Android HandyPay application.To trojanize HandyPay, threat actors most likely used GenAI.The campaign has been ongoing si ...
Cloud development platform Vercel has disclosed a security incident after threat actors claimed to have breached its systems ...
Adobe patches a critical PDF flaw exploited for months, allowing attackers to bypass sandbox protections and deliver malware.
Backed by Sonatype's industry-leading security research team, Sonatype Repository Firewall helped customers prevent 136,107 open source malware attacks in Q1. To explore the full findings from the Q1 ...
According to Cisco Talos, it's these URL-exposed webhooks – which make use of the same *.app.n8n [.]cloud subdomain – that ...